Network Operations

Edited

This activity list applies to all network devices (routers, switches, wireless access points, firewalls, other network services). The objective behind the activities is to secure its internal network, network connections and resources from intrusions and to provide/maintain the security of infrastructure and data and thus this policy provide guidelines to ensure availability and reliability of network devices for safe and secure connections to the information assets.

 

 

Category

Sub-Category

Name

Activity

Network Operations

Perimeter Security

Network Policy Enforcement Points

Network traffic to and from untrusted networks passes through a policy enforcement point; firewall rules are established in accordance to identified security requirements and business justifications. 

Network Operations

Perimeter Security

Inbound and Outbound Network Traffic: DMZ
Requirements

Network traffic to and from untrusted networks passes through a Demilitarized Zone (DMZ).

Network Operations

Perimeter Security

Ingress and Egress Points

[The organization] maintains an inventory of ingress and egress points on the production network and performs the following for each: 
• inventory is reduced to the minimum possible level
• permitted ports, protocols and services are inventoried and validated
• documents security features that are implemented for insecure protocols

Network Operations

Perimeter Security

Non-disclosure of Routing Information

[The organization] does not disclose private IP addresses and routing information to unauthorized parties.

Network Operations

Perimeter Security

Dynamic Packet Filtering

Where applicable, [the organization] enables dynamic packet filtering on the network.

Network Operations

Perimeter Security

Firewall Rule Set Review

Network infrastructure rule sets are reviewed [in accordance with the organization-defined frequency].

Network Operations 

Perimeter Security 

Trusted Connections 

All trusted connections are documented and approved by authorized personnel; management ensures the following documentation is in place prior to approval:
• agreement with vendor
• security requirements
• nature of transmitted information

Network Operations

Network Segmentation

Network Segmentation

Production environments are logically segregated from non- production environments.

Network Operations

Network Segmentation

Card Processing Environment Segmentation 

Where applicable, [the organization] segregates the Personal Account Number (PAN) infrastructure including payment card collection devices; [the organization] limits access to the segregated environment to authorized personnel.

Network Operations

Wireless Security

Disable Rogue Wireless Access Points

[The organization] employs mechanisms to detect and disable the use of unauthorized wireless access points.

Network Operations

Wireless Security

Wireless Access Points

[The organization] maintains an inventory of authorized wireless access points including a documented business justification.

Network Operations

Wireless Security

Rogue Wireless Access Point Mapping

[In accordance with the organization-defined frequency], [the organization] performs an access point mapping exercise to identify and remove unauthorized wireless access points.

Network Operations

Wireless Security

Authentication: Wireless Access Points

[The organization] restricts access to network services via wireless access points to authenticated users and services; approved wireless encryption protocols are required for wireless connections.